This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382 | Exploit Patch Third Party Advisory |
https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b | Patch Third Party Advisory |
https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36 | Broken Link Patch Third Party Advisory |
Configurations
Information
Published : 2020-10-20 04:15
Updated : 2022-12-02 11:45
NVD link : CVE-2020-7748
Mitre link : CVE-2020-7748
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
ts.ed_project
- ts.ed